CN110599637A - Identification information verification method and system - Google Patents
Identification information verification method and system Download PDFInfo
- Publication number
- CN110599637A CN110599637A CN201910720389.XA CN201910720389A CN110599637A CN 110599637 A CN110599637 A CN 110599637A CN 201910720389 A CN201910720389 A CN 201910720389A CN 110599637 A CN110599637 A CN 110599637A
- Authority
- CN
- China
- Prior art keywords
- identification information
- terminal
- verification
- information
- visitor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention provides a method and a system for verifying identification information, wherein the method comprises the following steps: generating identification information according to the personnel information through an authorization terminal; sending the identification information to the visitor terminal; enabling the visitor terminal to approach a verification terminal so that the verification terminal can acquire the identification information; and checking the identification information, and executing a preset decision mechanism according to the personnel information after the checking is passed. The invention has the beneficial effects that: through the remote acquisition of the identification information and the identification of the inspection information at the verification position, the information identification of the visitors is quickly completed, the space-isolated quick verification and visitor information identification are realized, and the problems of inconvenience and the like of the property security personnel for quickly identifying the information of the visitors, statistics of the property information of the visitors, and registration information of the visitors are solved.
Description
Technical Field
The invention relates to the technical field of security, in particular to a method and a system for verifying identification information.
Background
At present, each building district has higher and higher requirements on security, and property is required to carry out identity confirmation and visiting registration on personnel entering and exiting. Property security needs to identify owners, owner visitors, tenants and various distribution personnel, and the identification and verification process is complicated and difficult. The visitor is easy to be not matched with the owner, and the difficulty of the property security work is increased. The safety of the cell cannot be guaranteed. Property is identified for the owner and the visiting person in the cell, and the existing processing mode of each cell is as follows:
(1) the visitor is not identified and all the visitor is released.
(2) The owner holds the entrance guard card to the entrance and exit of the community to open the door and receive the person.
(3) The property security manually registers the identity information of the visitor.
The property is adopted by one or more of the above modes. There is a disadvantage in that it is difficult to secure cell security and visitor information cannot be confirmed if visitors are released loosely. It is too cumbersome to register visitor information against certificates. Especially for distribution personnel (such as take-out, express delivery, cleaning, etc.), manual registration of information is difficult to use for querying and counting visitor information.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention is directed to an identification information verification method and system for solving the problems in the prior art, such as difficulty in ensuring cell security, inability to confirm visitor information, complexity, difficulty in manually registering information for querying and counting visitor information, etc.
In one aspect, the present invention provides an identification information verification method, including:
generating identification information according to the personnel information through an authorization terminal;
sending the identification information to the visitor terminal;
enabling the visitor terminal to approach a verification terminal so that the verification terminal can acquire the identification information;
and checking the identification information, and executing a preset decision mechanism according to the personnel information after the checking is passed.
In the identification information verification method of the present invention, before the generating of the identification information according to the person information by the authorization terminal, the method includes:
and allocating an account and a right for generating identification information to the authorization terminal through the server.
In the identification information verification method of the present invention, the generating identification information by the authorization terminal according to the person information includes:
the authorization terminal sends a registration application to the server according to the personnel information;
the server returns feedback information for generating identification information to the authorization terminal according to the registration application;
and the authorization terminal generates the identification information according to the feedback information.
In the identification information verification method of the present invention, the sending of the identification information to the guest terminal:
and the authorization terminal sends the identification information to the visitor terminal through a network.
In the identification information verification method of the present invention, the step of enabling the verification terminal to acquire the identification information by the visitor terminal approaching the verification terminal includes:
generating and displaying a two-dimensional code by the visitor terminal according to the identification information;
and scanning the two-dimensional code through the checking terminal to acquire the identification information.
In the identification information verification method of the present invention, the step of enabling the verification terminal to acquire the identification information by the visitor terminal approaching the verification terminal includes:
and establishing near field communication between the visitor terminal and the verification terminal so that the verification terminal can acquire the identification information.
In the identification information verification method of the present invention, the verifying the identification information and executing a preset decision mechanism according to the person information after the verification is passed includes:
sending the identification information to a server through the verification terminal;
verifying the identification information through a server and returning a verification result to the verification terminal;
and judging whether the verification is passed or not through the verification terminal according to the verification result, and if so, executing a preset decision mechanism according to the personnel information.
In the identification information verification method, the decision mechanism is to control the access control equipment to be opened or closed within access time, wherein the personnel information comprises the access time.
In the identification information verification method of the present invention, the controlling of the access control device to be turned on or off within the access time includes:
and in the access time, when the verification terminal acquires the identification information, controlling the access control equipment to be switched on and off.
In another aspect, an identification information verification system is provided, which includes an authorization terminal, a guest terminal, a verification terminal and a server of the identification information verification method;
the authorization terminal is respectively in communication connection with the server and the visitor terminal, and the verification terminal is in communication connection with the server.
As described above, the method and system for verifying the identification information of the present invention have the following advantages:
through the remote acquisition of the identification information and the identification of the inspection information at the verification position, the information identification of the visitors is quickly completed, the space-isolated quick verification and visitor information identification are realized, and the problems of inconvenience and the like of the property security personnel for quickly identifying the information of the visitors, statistics of the property information of the visitors, and registration information of the visitors are solved.
Drawings
Fig. 1 is a flowchart of an identification information verification method according to an embodiment of the present invention;
fig. 2 is an information interaction diagram of an identification information verification method according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
It should be understood that the structures, ratios, sizes, and the like shown in the drawings and described in the specification are only used for matching with the disclosure of the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions under which the present invention can be implemented, so that the present invention has no technical significance, and any structural modification, ratio relationship change, or size adjustment should still fall within the scope of the present invention without affecting the efficacy and the achievable purpose of the present invention. In addition, the terms "upper", "lower", "left", "right", "middle" and "one" used in the present specification are for clarity of description, and are not intended to limit the scope of the present invention, and the relative relationship between the terms and the terms is not to be construed as a scope of the present invention.
As shown in fig. 1, fig. 1 is a flowchart of an identification information verification method according to an embodiment of the present invention. The invention provides an identification information checking method, which comprises the following steps of S1-S4:
s1, generating identification information through the authorization terminal according to the personnel information; step S1 includes steps S11-S13:
s11, the authorization terminal sends a registration application to the server according to the personnel information; the person information may include person nature, number of times, time limit, etc. The authorized terminal may be an APP in the owner's handset.
And S12, the server returns feedback information for generating identification information to the authorized terminal according to the registration application. That is, the personnel information is stored in the server, and the visiting information can be inquired later.
And S13, the authorization terminal generates the identification information according to the feedback information.
S2, sending the identification information to the visitor terminal; wherein the authorization terminal sends the identification information to the guest terminal through a network. For example: the authorization terminal sends the identification information to the visitor terminal through the WeChat. The visitor terminal may be an APP in the visitor's handset.
S3, enabling the visitor terminal to approach a verification terminal so as to enable the verification terminal to acquire the identification information; the verification terminal can be an APP in a mobile phone held by a security guard or an access control device. This step involves two examples, as follows:
the first embodiment comprises steps S301-S302:
s301, generating and displaying a two-dimensional code by the visitor terminal according to the identification information.
S302, scanning the two-dimensional code through the checking terminal to obtain the identification information.
The embodiment can also refer to fig. 2, and fig. 2 is an information interaction schematic diagram of an identification information verification method according to an embodiment of the present invention, and the specific process of the embodiment includes:
1. the owner sends a request message for information registration to the server.
2. The server performs information registration.
3. The server returns the two-dimensional code to the owner.
4. The business sends the two-dimensional code to visitors, such as takeaway guy and the like.
5. And the two-dimension code is displayed when the takeaway guy arrives at the entrance guard or the entrance guard.
6. This two-dimensional code of entrance guard's scanning or entrance guard use bar code scanner to scan this two-dimensional code.
7. And sending the two-dimensional code to a server for verification.
8. And the server checks and registers the two-dimensional code.
9. And the server returns a verification result to the entrance guard or entrance guard.
10. If the inspection is passed, the entrance guard is automatically opened or the entrance guard is released.
Embodiment two, include step S311:
s311, establishing near field communication between the visitor terminal and the verification terminal so that the verification terminal can acquire the identification information.
And S4, verifying the identification information, and executing a preset decision mechanism according to the personnel information after the verification is passed. Step S4 includes steps S41-S43:
and S41, sending the identification information to a server through the verification terminal.
And S42, verifying the identification information through the server and returning a verification result to the verification terminal.
And S43, judging whether the verification is passed or not through the verification terminal according to the verification result, and if so, executing a preset decision mechanism according to the personnel information. The decision mechanism is used for controlling the access control equipment to be switched on and off within access time, and the personnel information comprises the access time. Preferably, in the access time, when the verification terminal acquires the identification information, the access control equipment is controlled to be switched on and off.
For example: the property security passes through equipment (an automatic code scanning gate, a special handheld code scanning machine, a smart phone terminal and the like) to check the two-dimensional code, and personnel information verification and visiting registration are completed.
Preferably, step S0 is further included before step S1:
and S0, distributing an account and authority for generating identification information to the authorization terminal through the server. In general, the property allocates a system account and authority to the owner at one time.
The invention also provides an identification information verification system, which comprises the authorization terminal, the visitor terminal, the verification terminal and the server of the identification information verification method; authorizing terminal respectively communication connect in the server reaches visitor terminal, check-up terminal communication connect in the server, for example, authorizing the terminal and can be the APP in the owner's cell-phone, visitor terminal is the APP in the visitor cell-phone, and check-up terminal is the APP in the security mobile phone, authorizes the terminal and is connected to server and visitor terminal respectively through the internet, and check-up terminal is connected to the server through the internet, connects through two-dimensional code scanning or NFC (near Field communication) near Field communication between visitor terminal and the check-up terminal.
In conclusion, through applying for and registering visitor information in advance by the owner, the visitor can quickly pass through the access security system through the two-dimensional code. The safety check of the identity of the visitor is ensured, and the too much complicated negotiation of security, visitors and owners is not needed. The owner does not need to directly negotiate with property security, and the remote, quick and convenient completion is realized. The property ensures the registration of information (including access rights, access time, access owner, etc.) for each visitor. The visitor passes through the security place quickly and accurately.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (10)
1. An identification information verification method, comprising:
generating identification information according to the personnel information through an authorization terminal;
sending the identification information to the visitor terminal;
enabling the visitor terminal to approach a verification terminal so that the verification terminal can acquire the identification information;
and checking the identification information, and executing a preset decision mechanism according to the personnel information after the checking is passed.
2. The identification information verification method according to claim 1, wherein before generating the identification information from the person information by the authorization terminal, the method includes:
and allocating an account and a right for generating identification information to the authorization terminal through the server.
3. The identification information verification method according to claim 2, wherein the generating of the identification information from the person information by the authorization terminal includes:
the authorization terminal sends a registration application to the server according to the personnel information;
the server returns feedback information for generating identification information to the authorization terminal according to the registration application;
and the authorization terminal generates the identification information according to the feedback information.
4. The identification information verification method according to any one of claims 1 to 3, wherein said sending the identification information to the guest terminal:
and the authorization terminal sends the identification information to the visitor terminal through a network.
5. The identification information verification method according to any one of claims 1 to 3, wherein the step of enabling the verification terminal to acquire the identification information by the guest terminal approaching the verification terminal comprises:
generating and displaying a two-dimensional code by the visitor terminal according to the identification information;
and scanning the two-dimensional code through the checking terminal to acquire the identification information.
6. The identification information verification method according to any one of claims 1 to 3, wherein the step of enabling the verification terminal to acquire the identification information by the guest terminal approaching the verification terminal comprises:
and establishing near field communication between the visitor terminal and the verification terminal so that the verification terminal can acquire the identification information.
7. The method for verifying the identification information according to any one of claims 1 to 3, wherein the verifying the identification information, and the performing a preset decision mechanism according to the personnel information after the verification is passed comprises:
sending the identification information to a server through the verification terminal;
verifying the identification information through a server and returning a verification result to the verification terminal;
and judging whether the verification is passed or not through the verification terminal according to the verification result, and if so, executing a preset decision mechanism according to the personnel information.
8. The identification information verification method according to claim 7, wherein the decision mechanism is to control the entrance guard device to be turned on or off within an access time, wherein the personnel information includes the access time.
9. The method for verifying identification information of claim 8, wherein the controlling the entrance guard device to be turned on or off within the access time comprises:
and in the access time, when the verification terminal acquires the identification information, controlling the access control equipment to be switched on and off.
10. An identification information verification system comprising an authorized terminal, a guest terminal, a verification terminal and a server of the identification information verification method according to any one of claims 1 to 9;
the authorization terminal is respectively in communication connection with the server and the visitor terminal, and the verification terminal is in communication connection with the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910720389.XA CN110599637A (en) | 2019-08-07 | 2019-08-07 | Identification information verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910720389.XA CN110599637A (en) | 2019-08-07 | 2019-08-07 | Identification information verification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110599637A true CN110599637A (en) | 2019-12-20 |
Family
ID=68853629
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910720389.XA Pending CN110599637A (en) | 2019-08-07 | 2019-08-07 | Identification information verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110599637A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN108597066A (en) * | 2018-03-19 | 2018-09-28 | 广州启盟信息科技有限公司 | A kind of caller management method, device and computer readable storage medium |
CN109003362A (en) * | 2018-07-03 | 2018-12-14 | 广州启盟信息科技有限公司 | A kind of visitor invites passing method, device, system and storage medium |
CN109074686A (en) * | 2016-04-06 | 2018-12-21 | 奥的斯电梯公司 | Mobile managing caller |
CN109285250A (en) * | 2018-09-07 | 2019-01-29 | 友腾互联(北京)科技有限公司 | A kind of intelligent entrance guard control system based on wechat public platform |
US20190051076A1 (en) * | 2012-09-10 | 2019-02-14 | Mdi Security, Llc | System and method for deploying handheld devices to secure an area |
CN109523669A (en) * | 2018-11-19 | 2019-03-26 | 日立楼宇技术(广州)有限公司 | Data processing method, system and relevant device based on barcode scanning |
CN109920100A (en) * | 2019-02-01 | 2019-06-21 | 天地融科技股份有限公司 | A kind of smart lock method for unlocking and system |
-
2019
- 2019-08-07 CN CN201910720389.XA patent/CN110599637A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190051076A1 (en) * | 2012-09-10 | 2019-02-14 | Mdi Security, Llc | System and method for deploying handheld devices to secure an area |
CN109074686A (en) * | 2016-04-06 | 2018-12-21 | 奥的斯电梯公司 | Mobile managing caller |
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN108597066A (en) * | 2018-03-19 | 2018-09-28 | 广州启盟信息科技有限公司 | A kind of caller management method, device and computer readable storage medium |
CN109003362A (en) * | 2018-07-03 | 2018-12-14 | 广州启盟信息科技有限公司 | A kind of visitor invites passing method, device, system and storage medium |
CN109285250A (en) * | 2018-09-07 | 2019-01-29 | 友腾互联(北京)科技有限公司 | A kind of intelligent entrance guard control system based on wechat public platform |
CN109523669A (en) * | 2018-11-19 | 2019-03-26 | 日立楼宇技术(广州)有限公司 | Data processing method, system and relevant device based on barcode scanning |
CN109920100A (en) * | 2019-02-01 | 2019-06-21 | 天地融科技股份有限公司 | A kind of smart lock method for unlocking and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105405296B (en) | Wagon control disengaging system and method based on Car license recognition | |
KR101258689B1 (en) | Service providing system for visitors using cars | |
CN105095978B (en) | A kind of booking method based on two dimensional code, device and access control system | |
CN105491133A (en) | Intelligent visit system for visitors and intelligent electronic visit list formation method | |
CN105404930A (en) | Information processing method, server and system for visiting reservation information | |
CN107507305A (en) | A kind of access control system of residential community and door opening method based on wechat | |
CN103383785A (en) | System and method for automatic visitor check-in and access card issuance | |
CN106204864A (en) | Gate control system based on dynamic two-dimension code and door opening method | |
KR101690496B1 (en) | Parking control system used in visiting vehicle reservation and apparatus for parking controlling | |
KR101513172B1 (en) | Parking lot Reservation system using Smartphone App. | |
CN104700655A (en) | Parking route reminder implementation method and system based on mobile terminal | |
EP2387007A1 (en) | Access control method and system | |
CN109272583A (en) | A kind of automatic ticketing ticket checking method and system | |
CN107220715A (en) | Network service platform based on wechat | |
KR101855494B1 (en) | Door system and method using mobile device | |
CN105528641A (en) | Method for carrying out visit appointment based on local address book, terminal and server | |
CN105915617A (en) | Cell phone check-out APP step and integrated hotel network platform | |
CN108765638B (en) | Access control management method based on color codes | |
KR20150096850A (en) | Library seating management systems and its control method | |
CN106910366A (en) | A kind of Intelligent parking lot management system and its implementation based on mobile terminal | |
KR20160003932A (en) | System and method for issuing pass switched identification card using mobile terminal | |
KR102351250B1 (en) | Method for managing construction site | |
AU2015101875A4 (en) | Site Attendance Management System | |
CN106131058B (en) | On-line authentication system and method towards offline authentication equipment | |
KR20130142646A (en) | System for managing group using qr code and method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191220 |